Subscribe Now Subscribe Today
Research Article
 

Identity Authentication and Key Agreement Schemes for Ad Hoc Networks



Mohammad A. AL-Fayoumi and Sattar J. Aboud
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
ABSTRACT

Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes.

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
  How to cite this article:

Mohammad A. AL-Fayoumi and Sattar J. Aboud , 2007. Identity Authentication and Key Agreement Schemes for Ad Hoc Networks. Journal of Applied Sciences, 7: 1638-1642.

DOI: 10.3923/jas.2007.1638.1642

URL: https://scialert.net/abstract/?doi=jas.2007.1638.1642

REFERENCES
1:  Aresenault, A. and S. Turner, 2000. Internet X.509 public key infrastructure. http://www.ietf.org/rfc/rfc2459.txt.

2:  Ateniese, G., M. Steiner and G. Fsudik, 1998. Authenticated group key agreement and friends. Proceedings of the 5th ACM Conference on Computer and Communications Security, November 17-26, 1998, ACM, pp: 17-26.

3:  Ateniese, G., M. Steiner and G. Fsudik, 1998. Key agreement protocol in ad hoc networks. Proceedings of the International Conference on Communication Technology, October 22-24, 1998, China, pp: 296-301.

4:  Bettstetter, C. and B. Friedrich, 2003. Time and message complexities of the generalized distributed mobility adaptive clustering (GDMAC) algorithm in wireless multihop network. Proceedings of the 57th Semiannual Vehicular Technology Conference, April 22-25, 2003, Jeju, Korea, pp: 176-180.

5:  Desmedt, Y., 1994. Threshold cryptography. Eur. Trans. Tele-commun., 5: 449-457.

6:  Guillou, L. and L. Quisquater, 1990. A paradoxical identity based signature scheme resulting from zero knowledge. Proceedings of the International Cryptology Conference on Advances in Cryptology, August 21-25, 1988, Springer Verlag, London, pp: 216-231.

7:  Hezberg, H., D. Jarecki, H. Krawzyk and M. Young, 1995. Proactive secret sharing or: How to cope with perpetual leakage. Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, August 27-31, 1995, Springer Verlag, London, pp: 339-352.

8:  Jayakumar, C. and C. Chellappan, 2005. A ware energy efficient routing protocol for wireless ad-hoc network. Asian J. Inform. Technol., 4: 578-582.

9:  Kaliaperumal, S., 2003. Securing authentication and privacy in ad hoc partitioned networks. Proceedings of the 2003 Symposium on Applications and the Internet Workshops, January 27-31, 2003, IEEE Xplore, London, pp: 354-357.

10:  Khalili, A., J. Katz and W. Arbaugh, 2003. Toward secure key distribution in truly ad hoc networks. Proceedings of the International Conference on Applications over Ad-Hoc Networks, January 27-31, 2003, IEEE Xplore, pp: 342-346.

11:  Lang, W., M. Zhou and K. She, 2003. Key agreement protocol in ad hoc network. Proceedings of the International Conference on Communication Technology, April 9-11, 2003, IEEE Xplore, pp: 296-301.

12:  Luo, H., P. Zerfos, J. Kong, S. Lu and L. Zhong, 2002. Self securing ad hoc wireless networks. Proceedings of the 7th Symposium on Computers and Communications, July 1-4, 2002, Italy, pp: 567-574.

13:  Mauve, M., J. Widmer and H. Hartenstein, 2001. A survey on position-based routing in mobile ad hoc networks. IEEE Netw., 15: 30-39.
CrossRef  |  Direct Link  |  

14:  Pieprzyk, J. and C. Li, 2000. Multiparty key agreement protocols. IEE Proc. Comput. Digital Techniques, 147: 229-236.
Direct Link  |  

15:  Stjmenovic, I. and X. Lin, 2001. Power aware localized routing in wireless networks. IEEE Trans. Parallel Distrib. Syst., 12: 1122-1133.
Direct Link  |  

16:  Yao, J. and G. Zeng, 2004. Key agreement and identity authentication protocols for ad hoc network. Proceedings of the ITCC International Conference on Information Technology, April 5-7, 2004, Las Vegas, Nevada, USA., pp: 720-724.

17:  Zhou, L. and Z.J. Haas, 1999. Securing Ad Hoc networks. IEEE Network, 13: 24-30.
CrossRef  |  

©  2021 Science Alert. All Rights Reserved